Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Learning k for kNN Classification
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …
mining and machine learning due to its simple implementation and distinguished …
Energy-efficient resource allocation for secure OFDMA systems
In this paper, resource allocation for energy-efficient secure communication in an orthogonal
frequency-division multiple-access (OFDMA) downlink network is studied. The considered …
frequency-division multiple-access (OFDMA) downlink network is studied. The considered …
[Књига][B] Cyber-physical systems: from theory to practice
This book presents state-of-the-art of research results related to the science, technology, and
engineering of cyber-physical systems (CPS), including system architecture, development …
engineering of cyber-physical systems (CPS), including system architecture, development …
Toward secure and lightweight data transmission for cloud–edge–terminal collaboration in artificial intelligence of things
As one of data sources in cloud–edge–terminal collaboration enabled artificial intelligence
of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal …
of things (CETC-AIoT), the integrity and confidentiality of sensed information in the terminal …
Securing dynamic distributed storage systems against eavesdrop** and adversarial attacks
We address the problem of securing distributed storage systems against eavesdrop** and
adversarial attacks. An important aspect of these systems is node failures over time …
adversarial attacks. An important aspect of these systems is node failures over time …
Reliable and secure multishot network coding using linearized Reed-Solomon codes
U Martínez-Peñas… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Multishot network coding is considered in a worst-case adversarial setting in which an
omniscient adversary with unbounded computational resources may inject erroneous …
omniscient adversary with unbounded computational resources may inject erroneous …
Fundamentals of index coding
Index coding is a canonical problem in network information theory that studies the
fundamental limit and optimal coding schemes for broadcasting multiple messages to …
fundamental limit and optimal coding schemes for broadcasting multiple messages to …
Private coded caching
V Ravindrakumar, P Panda… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which
demonstrated the benefits of joint design of storage and transmission policies in content …
demonstrated the benefits of joint design of storage and transmission policies in content …